Threat name:
Raccoon RedLine SmokeLoader Tofsee
Alert
Classification:
troj.spyw.evad
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Benign windows process drops PE files
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
493908
Sample:
atis6bbo32.exe
Startdate:
30/09/2021
Architecture:
WINDOWS
Score:
100
87
91.219.236.162, 49835, 80
SERVERASTRA-ASHU
Hungary
2->87
89
t.me
149.154.167.99, 443, 49833
TELEGRAMRU
United Kingdom
2->89
91
5 other IPs or domains
2->91
139
Snort IDS alert for
network traffic (e.g.
based on Emerging Threat
rules)
2->139
141
Antivirus detection
for dropped file
2->141
143
System process connects
to network (likely due
to code injection or
exploit)
2->143
145
19 other signatures
2->145
11
atis6bbo32.exe
2->11
started
14
eehweju
2->14
started
16
svchost.exe
2->16
started
18
8 other processes
2->18
signatures3
process4
dnsIp5
155
Detected unpacking (changes
PE section rights)
11->155
21
atis6bbo32.exe
11->21
started
157
Multi AV Scanner detection
for dropped file
14->157
159
Machine Learning detection
for dropped file
14->159
24
eehweju
14->24
started
161
Changes security center
settings (notifications,
updates, antivirus,
firewall)
16->161
93
127.0.0.1
unknown
unknown
18->93
95
192.168.2.1
unknown
unknown
18->95
signatures6
process7
signatures8
147
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
21->147
149
Maps a DLL or memory
area into another process
21->149
151
Checks if the current
machine is a virtual
machine (disk enumeration)
21->151
153
Creates a thread in
another existing process
(thread injection)
21->153
26
explorer.exe
15
21->26
injected
process9
dnsIp10
97
193.56.146.41, 49781, 9080
LVLT-10753US
unknown
26->97
99
216.128.137.31, 80
AS-CHOOPAUS
United States
26->99
101
2 other IPs or domains
26->101
79
C:\Users\user\AppData\Roaming\eehweju, PE32
26->79
dropped
81
C:\Users\user\AppData\Local\Temp46.exe, PE32
26->81
dropped
83
C:\Users\user\AppData\Local\Temp\4AA6.exe, PE32
26->83
dropped
85
5 other malicious files
26->85
dropped
179
System process connects
to network (likely due
to code injection or
exploit)
26->179
181
Benign windows process
drops PE files
26->181
183
Deletes itself after
installation
26->183
185
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
26->185
31
E46.exe
15
6
26->31
started
36
2897.exe
26->36
started
38
19D0.exe
26->38
started
40
2 other processes
26->40
file11
signatures12
process13
dnsIp14
111
ipapi.co
104.26.8.44, 443, 49782
CLOUDFLARENETUS
United States
31->111
73
C:\Users\user\AppData\Roaming46.exe, PE32
31->73
dropped
113
Antivirus detection
for dropped file
31->113
115
Multi AV Scanner detection
for dropped file
31->115
117
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
31->117
133
2 other signatures
31->133
42
E46.exe
31->42
started
119
Detected unpacking (changes
PE section rights)
36->119
121
Machine Learning detection
for dropped file
36->121
123
Contains functionality
to inject code into
remote processes
36->123
125
Injects a PE file into
a foreign processes
36->125
46
2897.exe
36->46
started
75
C:\Users\user\AppData\Local\...\ztcmzcht.exe, PE32
38->75
dropped
127
Detected unpacking (overwrites
its own PE header)
38->127
135
2 other signatures
38->135
48
cmd.exe
38->48
started
51
cmd.exe
38->51
started
53
sc.exe
38->53
started
59
3 other processes
38->59
129
Query firmware table
information (likely
to detect VMs)
40->129
131
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
40->131
137
2 other signatures
40->137
55
3133.exe
2
40->55
started
57
conhost.exe
40->57
started
61
2 other processes
40->61
file15
signatures16
process17
dnsIp18
103
185.203.242.21, 49873, 80
ON-LINE-DATAServerlocation-NetherlandsDrontenNL
Ukraine
42->103
105
172.67.69.226, 443, 49825, 49855
CLOUDFLARENETUS
United States
42->105
109
2 other IPs or domains
42->109
163
Antivirus detection
for dropped file
42->163
165
Multi AV Scanner detection
for dropped file
42->165
167
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
42->167
177
5 other signatures
42->177
169
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
46->169
171
Maps a DLL or memory
area into another process
46->171
173
Checks if the current
machine is a virtual
machine (disk enumeration)
46->173
175
Creates a thread in
another existing process
(thread injection)
46->175
77
C:\Windows\SysWOW64\...\ztcmzcht.exe (copy), PE32
48->77
dropped
63
conhost.exe
48->63
started
65
conhost.exe
51->65
started
67
conhost.exe
53->67
started
107
188.72.208.174, 38430, 49857
WEBZILLANL
Netherlands
55->107
69
conhost.exe
59->69
started
71
conhost.exe
59->71
started
file19
signatures20
process21
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.